Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-1386
Analyzed
More InfoOfficial Page
Source-ff89ba41-3aa1-4d27-914a-91399e9639e5
View Known Exploited Vulnerability (KEV) details
Published At-23 Jan, 2026 | 21:15
Updated At-30 Jan, 2026 | 16:57

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.0MEDIUM
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.16.0MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 6.0
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 6.0
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
CPE Matches

amazon
amazon
>>firecracker>>Versions before 1.13.2(exclusive)
cpe:2.3:a:amazon:firecracker:*:*:*:*:*:*:*:*
amazon
amazon
>>firecracker>>1.14.0
cpe:2.3:a:amazon:firecracker:1.14.0:-:*:*:*:*:*:*
amazon
amazon
>>firecracker>>1.14.0
cpe:2.3:a:amazon:firecracker:1.14.0:dev:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-61Secondaryff89ba41-3aa1-4d27-914a-91399e9639e5
CWE ID: CWE-61
Type: Secondary
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://aws.amazon.com/security/security-bulletins/2026-003-AWS/ff89ba41-3aa1-4d27-914a-91399e9639e5
Vendor Advisory
https://github.com/firecracker-microvm/firecracker/releases/tag/v1.13.2ff89ba41-3aa1-4d27-914a-91399e9639e5
Release Notes
Product
https://github.com/firecracker-microvm/firecracker/releases/tag/v1.14.1ff89ba41-3aa1-4d27-914a-91399e9639e5
Release Notes
Product
https://github.com/firecracker-microvm/firecracker/security/advisories/GHSA-36j2-f825-qvgcff89ba41-3aa1-4d27-914a-91399e9639e5
Vendor Advisory
Hyperlink: https://aws.amazon.com/security/security-bulletins/2026-003-AWS/
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Resource:
Vendor Advisory
Hyperlink: https://github.com/firecracker-microvm/firecracker/releases/tag/v1.13.2
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Resource:
Release Notes
Product
Hyperlink: https://github.com/firecracker-microvm/firecracker/releases/tag/v1.14.1
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Resource:
Release Notes
Product
Hyperlink: https://github.com/firecracker-microvm/firecracker/security/advisories/GHSA-36j2-f825-qvgc
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Resource:
Vendor Advisory
Change History
0Changes found

Details not found